SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : All About Sun Microsystems

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Brian Sullivan who wrote (42854)4/9/2001 9:18:47 PM
From: DiViT  Read Replies (1) of 64865
 
CERT® Advisory CA-2001-05 Exploitation of snmpXdmid

Original release date: March 30, 2001
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected
Any machine running Solaris 2.6, 7, or 8 with snmpXdmid installed and enabled. snmpXdmid is installed and enabled by default on these systems.

[snip]

II. Impact
A local or remote user that is able to send packets to the snmpXdmi daemon on a system may gain root privileges.

III. Solution
Apply a patch from Sun when it is available
Sun has been notified of this issue and is actively working on patches to address the problem. This advisory will be updated when patches are available.

cert.org
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext